Incident Response Analyst
McLean, VA
Full Time Entry-level / Junior Clearance required USD 65K - 121K *
Dezign Concepts LLC
20241121-0149-19-045-01
Active Top Secret Clearance with Poly Required
(salary is commensurate with education and experience)
Please Note:
This job requires an existing Top Secret Clearance and Polygraph.
Experience Needed:
- Citizenship: Must Be a US Citizen
- Existing Clearance Required: Active Top Secret SCI with Poly
- Expert level experience required
- Must meet Department of Defense (DOD) 8570.01-M baseline certification requirement for Information Assurances Technical (IAT) Level III CASP+CE, CCNP Security, CISA, or CISSP or Associate, GCED, GCIH, or CCSP.
- Minimum of 3 year experience Computer Forensic Analyst and or Computer Network Defense CND Forensic Analyst
- Collect intrusion artifacts (e.g., source code, malware, trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.
- Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents.
- Coordinate incident response functions within a cloud environment.
- Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat conditions and determine which security issues may have an impact on the enterprise.
- Perform cyber defense trend analysis and reporting.
- Perform initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems.
- Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.
- Write and publish after-action reviews.
- Write and publish cyber defense techniques, guidance, and reports on incident findings to appropriate constituencies.
- Skill in conducting vulnerability scans and recognizing vulnerability in security systems (e.g., Cloud Environments) AWS, Google, IBM, Azure, and Oracle.
- Skill in preserving evidence integrity according to standard operating procedures or national standards.
- Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions.
- Knowledge of cyber defense and information security policies, procedures, and regulations.
- Skill in protecting a network against malware. (e.g., NIPS, anti-malware, restrict/prevent external devices, spam filters).
- Knowledge of incident categories, incident responses, and timelines for responses.
- Knowledge of incident response and handling methodologies.
- Skill in performing damage assessments.
- Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
- Skill in securing network communications.
- Skill in using security event correlation tools.
- Knowledge of network services and protocols interactions that provide network communications.
- Knowledge of OSI model and underlying network protocols (e.g., TCP/IP).
- Knowledge of cloud service models and how those models can limit incident response.
- Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
- Knowledge of system administration, network, and operating system hardening techniques.
- Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
- Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state-sponsored, and nation sponsored).
- Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
- Knowledge of malware analysis concepts and methodologies.
- Skill of identifying, capturing, containing, and reporting malware.
- Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
- Knowledge of what constitutes a network attack and a network attack’s relationship to both threats and vulnerabilities.
- Skill in recognizing and categorizing types of vulnerabilities and associated attacks.
Benefits
Our comprehensive benefits package includes Medical, Dental, Vision, Health Savings Account, Paid Time Off, Holidays, Social Events, Employee Assistance Program, Team Building Activities, 401K, Tuition Assistance, and more.
Contact Us: Main Number: 1-888-663-2690 | info@Dezign-Concepts.com | www.dezign-concepts.com
Dezign Concepts provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.
This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Application security AWS Azure CASP+ CCNP CCSP CISA CISSP Clearance Clearance Required Cloud CND Cyber defense DNS DoD DoDD 8570 GCED GCIH Incident response Intrusion detection Malware Network security Oracle Polygraph Scripting SQL TCP/IP Top Secret Top Secret Clearance Vulnerabilities Vulnerability scans XSS
Perks/benefits: Career development Health care Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.